CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Tags
Description
A vulnerability, which was classified as critical, has been found in code-projects Simple Shopping Cart 1.0. This issue affects some unknown processing of the file /Customers/save_order.php. The manipulation of the argument order_price leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-7607 is a critical SQL injection vulnerability in code-projects Simple Shopping Cart 1.0 affecting the /Customers/save_order.php file, where the order_price parameter is improperly sanitized, allowing remote unauthenticated attackers to execute arbitrary SQL queries. The vulnerability has a public exploit disclosure and carries a CVSS score of 7.3 with demonstrated real-world exploitation potential, making it a high-priority security concern for affected deployments.
Technical Context
The vulnerability exists in Simple Shopping Cart 1.0 (CPE: cpe:2.3:a:code-projects:simple_shopping_cart:1.0:*:*:*:*:*:*:*) due to improper input validation in the order processing functionality. The root cause is classified under CWE-74 (Improper Neutralization of Special Elements in Output - 'Injection'), specifically SQL injection. The /Customers/save_order.php file fails to properly parameterize or sanitize the order_price parameter before incorporating it into SQL query construction, allowing attackers to inject arbitrary SQL commands. This is a classic procedural code vulnerability where user-supplied input is concatenated directly into SQL queries without prepared statements or input validation.
Affected Products
[{'product': 'Simple Shopping Cart', 'vendor': 'code-projects', 'affected_versions': ['1.0'], 'cpe': 'cpe:2.3:a:code-projects:simple_shopping_cart:1.0:*:*:*:*:*:*:*', 'affected_components': ['/Customers/save_order.php'], 'vulnerable_parameters': ['order_price']}]
Remediation
[{'type': 'patch', 'description': 'Upgrade to a patched version if available from code-projects. Check vendor advisory for Simple Shopping Cart security updates beyond version 1.0.', 'action': 'Contact code-projects for patch availability or monitor their repository for security releases'}, {'type': 'mitigation', 'description': 'Implement prepared statements/parameterized queries in /Customers/save_order.php to prevent SQL injection', 'action': 'Replace all SQL concatenation with prepared statements using bound parameters for order_price and all user inputs'}, {'type': 'mitigation', 'description': 'Implement input validation and sanitization for the order_price parameter', 'action': 'Validate that order_price is a valid numeric format before use; reject non-numeric input'}, {'type': 'mitigation', 'description': 'Implement Web Application Firewall (WAF) rules', 'action': 'Deploy WAF signatures to detect and block SQL injection patterns in the order_price parameter'}, {'type': 'mitigation', 'description': 'Principle of least privilege for database accounts', 'action': 'Ensure the database user running queries from save_order.php has minimal required permissions, limiting blast radius of SQL injection'}, {'type': 'monitoring', 'description': 'Enable SQL query logging and audit suspicious patterns', 'action': 'Monitor database logs for SQL syntax errors and unusual query patterns indicating injection attempts'}]
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-21346